Release date: September 9, 2014
Profile Name | ESXi-5.5.0-20140902001-standard |
Build | For build information, see KB 2079725. |
Vendor | VMware, Inc. |
Release Date | September 9, 2014 |
Acceptance Level | PartnerSupported |
Affected Hardware | N/A |
Affected Software | N/A |
Affected VIBs | VMware_bootbank_esx-base_5.5.0-2.33.2068190, VMware_bootbank_esx-tboot_5.5.0-2.33.2068190, VMware_locker_tools-light_5.5.0-2.33.2068190, VMware_bootbank_net-tg3_3.123c.v55.5-1vmw.550.2.33.2068190, VMware_bootbank_sata-ahci_3.0-20vmw.550.2.33.2068190, VMware_bootbank_scsi-megaraid-sas_5.34-9vmw.550.2.33.2068190, VMware_bootbank_misc-drivers_5.5.0-2.33.2068190, VMware_bootbank_sata-ata-piix_2.12-10vmw.550.2.33.2068190 |
PRs Fixed | 918590, 1037088, 1083575, 1092777, 1114023, 1115359, 1129747, 1134691, 1137004, 1137276, 1138815, 1142362, 1143702, 1148226, 1148832, 1150472, 1162498, 1165712, 1166105, 1166611, 1166844, 1167294, 1168714, 1170618, 1171064, 1173068, 1179163, 1194750, 1195733, 1196455, 1197351, 1197729, 1197761, 1197781, 1199489, 1200214, 1200381, 1201390, 1202489, 1202936, 1202958, 1204085, 1208353, 1210129, 1214779, 1216492, 1216850, 1217528, 1219338, 1219692, 1220833, 1224625, 1225606, 1227158, 1229385, 1230050, 1233143, 1236098, 1236401, 1239797, 1239938, 1241633, 1245894, 1255916, 1260478, 1089690, 1147656, 1204553, 1214493, 1216736, 1221217, 1252476, 1275409, 1095969, 1073491, 1217992, 1237298, 1148735, 1139093, 1145945, 1143788, 1160852, 1160570, 1244945, 1253788, 1256944, 1283650, 1195054, 1226131, 1229998, 1231788, 1237733, 1141296, 1159505, 1174550 |
Related CVE numbers | N/A |
For more information on patch and update classification, see KB 2014447. To search for available patches, see the Patch Manager Download Portal.
This patch updates the esx-base, esx-tboot, tools-light, net-tg3, sata-ahci, scsi-megaraid-sas, misc-drivers, sata-ata-piix VIBs to resolve the following issues:
You see entries similar to the following in vmkernel.log:
cpu0:1097177)WARNING: IOMMUIntel: 2436: DMAR Fault IOMMU Unit #1: R/W=W, Device 0000:07:00.1 Faulting addr = 0xfd3fa000 Fault Reason = 0x05 -> PTE not set to allow Write.^[[0m
cpu0:1097177)WARNING: IOMMUIntel: 2493: IOMMU context entry dump for 0000:07:00.1 Ctx-Hi = 0x302 Ctx-Lo = 0x14ac52001^[[0m
Cannot create DVPort portnumber of VDS switchname on the host hostname
A general system error occurred.
When you attempt to modify an existing traffic filtering rule on a port group, you see this error:
Cannot complete a vSphere Distributed Switch operation for one or more host members.
vDS operation failed on host hostname, Received SOAP response fault from [ TCP:hostname:443>]: invokeHostTransactionCall
Received SOAP response fault from [ ]: invokeHostTransactionCall
A general system error occurred: got (vmodl.fault.SystemError) exception
The hostd.log file (located at /var/log/ on the target ESXi host) contains entries similar to:
YYYY-02-07T17:57:21.859Z [FF90D5B0 error 'Default' opID=577f035c-5f user=vpxuser] AdapterServer caught unexpected exception: Not a valid netmask
Timeout error accepting SSL connection exiting.
This issue occurs when two or more users are logged into Windows Terminal Server or Linux. To fully resolve the issue, you also need to update the esx-base VIB by applying the ESXi550-201409201-UG bulletin and update the tools-light VIB by applying the ESXi550-201409202-UG bulletin.
LSILSIESG_PhysicalDrive.Tag="500605B004F93CF0_252_36",CreationClassName="LSIESG_PhysicalDrive"
CreationClassName = LSIESG_PhysicalDrive
Tag = 500605B004F93CF0_252_36
UserDataBlockSize = 512
PiType = 0
PiEligible = 0
PiFomatted = 0
PowerState = 0 ---> No change in status
Vendor = (NULL)
FRUNumber = (NULL)
DiskDrive_DeviceID = 252_36
vpxd-8.log:2013-11-21T20:44:49.902Z [7F69C7CF9700 info 'vmdasVm' opID=FdmWaitForUpdates-domain-c26-45712e7f] [VmMo::UpdateActualDasProtectStateLocked] actual protection state for VM vm-93 'unprotected' -> 'protected'
vpxd-10.log:2013-11-22T00:03:01.731Z [7F69D4832700 info 'vmdasVm' opID=FdmWaitForUpdates-domain-c26-6b160bef] [VmMo::UpdateActualDasProtectStateLocked] actual protection state for VM vm-93 'protected' -> 'unprotected'
None beyond the required patch bundles and reboot information listed in the table above.
The typical way to apply patch bulletin to ESXi hosts is through the VMware Update Manager. For details, see the Installing and Administering VMware vSphere Update Manager.
ESXi hosts can be updated by manually downloading the patch ZIP file from the VMware download page and installing the VIB by using the esxcli software vib command. Additionally, the system can be updated using the image profile and the esxcli software profile command. For details, see the vSphere Command-Line Interface Concepts and Examples and the vSphere Upgrade Guide.